Latest Articles

[img_assist|nid=4470|title=|desc=|link=none|align=right|width=100|height=100]Google has released version 4.1.249.1059 of Chrome for Windows, a security update that addresses four high risk vulnerabilities in its WebKit-based browser. These vulnerabilities are; a memory corruption issue in Chrome’s V8 JavaScript Engine, type confusion errors with forums, cross-site scripting (XSS) vulnerabilities on the Chrome downloads page and HTTP request errors that could lead to possible cross-site request forgeries (XSRF). Read the full article. [The H Security]

Read more...

[img_assist|nid=4420|title=|desc=|link=none|align=left|width=100|height=100]According to research, the malicious iframe used in the latest Network Solutions attack pointed to corpadsinc.com which then downloads Adobe exploits onto victims’ machines. The hacks raise an issue increasingly being faced by Website owners: what’s the responsibility of the ISP or service or cloud provider to provide more application-layer security?

Read more...

[img_assist|nid=4466|title=|desc=|link=none|align=right|width=100|height=100]A pair of security researchers has discovered a number of new attack vectors that give them the ability to not only locate any GSM mobile handset anywhere in the world, but also find the name of the subscriber associated with virtually any cellular phone number, raising serious privacy and security concerns for customers of all of the major mobile providers.

Read more...

[img_assist|nid=4465|title=|desc=|link=none|align=left|width=100|height=100]Google is investigating a growing number of reports that hackers are breaking into legitimate Gmail accounts and then using them to send spam messages. The problem started about a week ago but seems to have escalated over the past few days. Read the full article. [IDG News Service]

Read more...

[img_assist|nid=4467|title=|desc=|link=none|align=right|width=100|height=100]Researchers at the Univeristy of Texas at Dallas have developed a method for analyzing the activity log
files of corporate firewalls. Their analysis can determine what rules the firewall is actually applying
to incoming and outgoing network traffic and then compare these with
the original rules to spot errors and omissions. Read the full article. [Science Daily]

Read more...

The SANS Institute has released critical security controls for cyber defense agreed to by a consortium of agencies including: “NSA, US Cert, DoD, DoD JTF-GNO, the Department of Energy Nuclear Laboratories, Department
of State, DoD Cyber Crime Center plus the top commercial forensics
experts and pen testers that serve the banking and critical
infrastructure communities,” according to the SANS website. Read the SANS Institute consensus audit guidelines.

Read more...

Categories: Uncategorized

Tenga cuidado con las estafas en Facebook.

Dos estafas comunes son:

1) Uno de sus amigos de pronto le manda un mensaje de que necesita
dinero de emergencia porque ha sido asaltado o algo así en una tierra lejana. Entonces
usted se ve involucrado en una conversación para prestarle dinero. Esto es lo
que sucede cuando la cuenta de su amigo ha sido robada.

Read more...

Categories: Slideshow

Mucha gente juega en Facebook. Algunos juegos son divertidos. Pero si no
está interesado en un juego en específico y sus mensajes se están volviendo
realmente molestos, puede asegurarse de NO obtener mensajes de ellos yendo a su
página y bloqueando la aplicación.

Read more...